Reliance Investments, Expectation Damages and Hidden Information

Discussion Paper No. 162
Reliance Investments, Expectation
Damages and Hidden Information
Urs Schweizer*
September 2006
*Urs Schweizer, Department of Economics, University of Bonn, Adenauerallee 24, 53113 Bonn, Germany.
[email protected]
Financial support from the Deutsche Forschungsgemeinschaft through SFB/TR 15 is gratefully acknowledged.
Sonderforschungsbereich/Transregio 15 · www.gesy.uni-mannheim.de
Universität Mannheim · Freie Universität Berlin · Humboldt-Universität zu Berlin · Ludwig-Maximilians-Universität München
Rheinische Friedrich-Wilhelms-Universität Bonn · Zentrum für Europäische Wirtschaftsforschung Mannheim
Speaker: Prof. Konrad Stahl, Ph.D. · Department of Economics · University of Mannheim · D-68131 Mannheim,
Phone: +49(0621)1812786 · Fax: +49(0621)1812785
Reliance Investments, Expectation Damages
and Hidden Information
Urs Schweizer,∗†University of Bonn
September 13, 2006
Abstract
A setting of reliance investments is explored where one of the parties to a contract obtains private information concerning his utility or
cost function that remains hidden to the other party and to courts.
As a consequence, it will be a difficult task to award expectation damages corrrectly to a party with private information who sufffers from
breach of contract. While a revelation mechanism would exist that
leads to the first best solution, assessing expectation damages correctly turns out to be at odds with ex post efficiency. I conclude
that, under asymmetric information, the performance of expectation
damages falls short of what more general mechanisms could achieve.
Keywords: reliance investments, expectation damages, breach of
contract, hidden information
JEL classification: K12, D82
∗
address: Urs Schweizer, Department of Economics, University of Bonn, Adenauerallee
24, 53113 Bonn, Germany, [email protected]
†
Support through SFB/TR 15 is gratefully acknowledged.
1
1
Introduction
Actions of a party to a contract are called reliance investments if they are
taken in reliance on performance of the other party. Reliance investments enhance the value of performance but must be undertaken before the promisee
knows whether the promisor will perform.
Suppose one of the parties fails to perform as specified in the contract.
Then the other party may seek recovery by claiming expectation damages. If
expectation damages are granted in the correct amount the party who suffers
from breach will be made equally well off as if the breaching party had met
his obligation.
It is a common tenet of the economic analysis of contract law that, under
the expectation measure, there will be incentives toward excessive reliance.
Shavell (1980) had established the overreliance result in a formal model (for
a more recent statement of the result, see Shavell (2004)). Edlin and Reichelstein (1996), however, called the overreliance result in question. In a setting
of quantity choice, they showed that the expectation measure provides efficient incentives if reliance investments are one-sided, if the contract specifies
some suitable intermediate quantity of trade as performance obligation and
if, ex post, inefficient performance choices are renegotiated.
Whether expectation damages provide efficient incentives or not, for being
granted, they must be verified in front of courts. In particular, if asymmetric
information is involved, this may be a difficult task. The party suffering
from breach may be denied recovery just because courts feel unable to assess
expectation damages correctly.
The present paper takes up the issue of assessing expectation damages
under asymmetric information. A setting of one-sided reliance investments is
explored where one of the parties receives information about his utility, profit
or cost function that remains hidden to the other party and to courts. The
setting is simple enough that a revelation mechanism of the Clarke-Groves
type would easily generate the first best solution. Yet, as will be shown, the
transfer payments arising from such a mechanism do not reflect expectation
damages correctly.
For this reason, the paper rather examines the class of mechanisms that
would assess expectation damages correctly. In its general form, such a mech-
2
anism defines a transfer schedule that specifies net payments due as a function
of performance choice, of reliance investments (if verifiable) and of a message
sent by the informed party. The transfer schedule is said to reflect expectation damages correctly if, along the equilibrium path, transfer payments are
consistent with correct expectation damages, state by state.
As it turns out, assessing expectation damages correctly comes at a price
in terms of efficiency loss. It is shown that mechanisms assessing expectation damages correctly will implement performance decisions only that are
constant over states. Typically, such outcomes fail to be ex post efficient.
Therefore, assessing expectation damages correctly is at odds with ex post
efficiency.
Notice, in contrast to the informational setting of Edlin and Reichelstein,
renegotiations would not offer an easy remedy for ex post efficiency in the
present framework. In fact, as follows from the impossibility result of Myerson and Satterthwaite (1981), asymmetric information may be a source of
transaction costs and, hence, the Coase Theorem may fail to hold. In any
case, renegotiations under asymmetric information cannot be expected to
restore ex post efficiency as would be the case under symmetric information.
Legal practice facing problems of hidden information usually takes resort to objective damage measures. Such measures are based on prudent or
reasonable investment behavior and/or on the average type of a fictitious
agent. By construction, these measures differ from subjective expectation
damages that were required to compensate the promisee for her loss. Worse,
while failing to assess expectation damages correctly, such schemes also fail
to generate efficient performance outcomes.
Some legal systems allow the promisee to opt for recovery of reliance
expenditures if expectation damages cannot be verified in front of courts.
Unfortunately, in the setting of the present paper, this option also fails to
restore ex post efficiency.
These findings support the following conclusion. While expectation damages seem to work well under symmetric information, at least if continuous
performance choice is at stake, the performance of expectation damages under asymmetric information falls short of what more general mechanisms may
achieve.
The paper is organized as follows. Section 2 introduces the basic reliance
3
setting and derives the first best solution, as a reference point, by backwards
induction. Section 3 contains the main findings of the paper. In particular,
it is shown that transfer schedules reflecting expectation damages correctly
provide incentives for outcomes that are constant over states and, hence,
will typically fail to be ex post efficient. The overreliance result of Shavell
is also briefly revisited. In a setting of complete information, overreliance is
shown to be due to binary performance choice and not to a basic defect of the
expectation measure as such. Section 4 investigates incentives arising from
common methods of legal practice. Neither objectifying expectation damages
nor allowing to opt for reliance instead of expectation damages would provide
incentives for state-contingent outcomes. Section 5 concludes. The proof of
the main result is relegated to the appendix.
2
The general setting
Two risk-neutral parties A and B — think of a buyer and seller — have signed
a contract. Thereafter, party A chooses reliance investments r ∈ R =
[0, ∞) before nature reveals an information parameter θ from an interval
Θ = [θL , θH ] of the real line. Information, however, remains private to party
A or, alternatively, to party B. Nature’s move is purely random. At the final
stage, the performance decision q ∈ Q is due. Q is assumed to be a subset
of the real line and may consist of an interval Q = [qL , qH ] or it may be just
binary Q = {qL , qH } with the interpretation perform (qH ) and not perform
(qL ). In the case of continuous performance choice, think of q as the quantity
or quality of a good to be exchanged or of the speed of delivery. Edlin and
Reichelstein (1996) deal with continuous performance choice whereas Shavell
(1980) examines binary choice. The present setting allows for both versions.
The social surplus amounts to W (r, θ, q). If it is party A who obtains private information then social surplus is assumed to be of structure W (r, θ, q) =
V (r, θ, q) − C(q) − r where V (r, θ, q) denotes A’s utility or profit function
and C(q) party B’s cost function. Similarly, if it is party B who obtains pri-
vate information then the assumed structure of social surplus is W (r, θ, q) =
V (r, q) − C(θ, q) − r. In either case, at the investment stage, the effect of
reliance investments on social surplus is uncertain.
As a reference point, the first best solution is constructed by backwards
4
induction. The socially best response
q + (r, θ) ∈ arg max W (r, θ, q)
q∈Q
maximizes social surplus at the performance stage where reliance investments
and the move of nature are given. Efficient reliance investments
r∗ ∈ arg max E[W (r, θ, q+ (r, θ))]
r∈R
maximize the ex ante expected social surplus. Notice, here and elsewhere in
the paper, the expectation operator is taken with respect to the distribution
of nature’s random move. Efficient performance
q ∗ (θ) = q + (r∗ , θ)
is the socially best response to efficient reliance investments. It then follows
that
r∗ ∈ arg max E[W (r, θ, q ∗ (θ))]
r∈R
must also hold. The following assumptions will be imposed.
Assumptions
(a) If θ < θ0 then the difference W (r, θ0 , q) − W (r, θ, q) is strict monoton-
ically increasing as a function of q.
(b) If q < q 0 then the difference W (r, θ, q 0 ) − W (r, θ, q) is monotonically
increasing as a function of r.
(c) If q < q 0 then V (·, q) < V (·, q0 ).
Notice, in a differentiable setting, (a) would hold if the second derivative
Wqθ > 0 is positive. This condition is well-known from mechanism design as
the single-crossing property. Similarly, (b) would hold, if the second derivative Wqr > 0 is positive, which means, that, net of investment costs, the
marginal social product is an increasing function of investments. Assumption
(c) requires utility or profit of party A net of investment costs to be strict
monotonically increasing as a function of performance choice.1
1
While some readers may feel more familiar with the differentiable version of the above
assumptions, to avoid mathematical subtleties of mechanism design and to treat binary
and continuous performance choice in an unified framework, I prefer the version that avoids
calculus.
5
The following two auxiliary results are established for later reference. Under the single-crossing property, the socially best response is a monotonically
increasing function of private information. Moreover, there exist constant
performance decisions such that the ex ante optimal reliance investments are
lower and higher, respectively, as compared to efficient investments.
Lemma 1 Suppose assumption (a) is met. If θ < θ0 then q + (r, θ) ≤ q(r, θ0 ).
Notice, in a differentiable setting where the socially best response is an
interior solution, the socially best response will be even strict monotonically
increasing as a function of private information. In particular, ex post efficient
performance choice will typically be state-contingent.
Lemma 2 Suppose assumption (b) is met. Then, for i = L, H, there exists
ri ∈ arg max E[W (r, θ, qi )]
r∈R
such that rL ≤ r∗ ≤ rH .
Notice, in a differentiable setting with continuous performance choice, it
follows from Lemma 2 that an intermediate performance decision q oo ∈ Q,
qL < q oo < qH , exists such that
r∗ ∈ arg max E[W (r, θ, q oo ]
r∈R
holds. Moreover, it follows from the assumed structure of social surplus that
arg max E[W (r, θ, qoo )] = arg max E[V (r, θ, qoo )] − r
r∈R
r∈R
must hold if it is party A who obtains private information whereas
arg max E[W (r, θ, qoo )] = arg max V (r, qoo ) − r
r∈R
(1)
r∈R
must hold if it is party B who obtains private information.
Proof of Lemma 1.
Take any performance decision q > q + (r, θ0 ). Then, by assumption (a),
W (r, θ0 , q + (r, θ0 )) − W (r, θ, q + (r, θ0 )) < W (r, θ0 , q) − W (r, θ, q)
and, hence,
h
i
W (r, θ, q) < W (r, θ, q+ (r, θ0 )) − W (r, θ0 , q + (r, θ0 )) − W (r, θ0 , q) ≤
≤ W (r, θ, q+ (r, θ0 )).
6
It follows that no performance decision in the range above q+ (r, θ0 ) maximizes
W (r, θ, q) and, hence, Lemma 1 is established.
Proof of Lemma 2.
Take any reliance investment r > r∗ . It then follows from assumption (b)
that
W (r∗ , θ, q ∗ (θ)) − W (r∗ , θ, qL ) ≤ W (r, θ, q ∗ (θ)) − W (r, θ, qL )
and, hence, that
E [W (r, θ, qL )] ≤ E [W (r∗ , θ, qL )] − E [W (r∗ , θ, q∗ (θ)) − W (r, θ, q ∗ (θ))]
≤ E [W (r∗ , θ, qL )]
must hold. Therefore, E [W (r, θ, qL )] attains a maximum in the range r ≤ r∗
and the first claim of Lemma 2 is established. The second claim of Lemma
2 can be established similarly.
Observe, if the difference in assumption (b) is strictly monotonically increasing in r and if efficient performance is inner (i.e. q ∗ (θ) ∈ (qL , qH ))
with positive probability then the claims of Lemma 2 would hold for any
ri ∈ arg maxr∈R E[W (r, θ, qi )].
3
Mechanisms reflecting expectation damages
This section presents the main results of the paper. Since private information is involved it may be difficult for courts to award the correct amount of
damages. To cope with such problems of hidden information, parties may
take resort to sophisticated revelation mechanisms. In fact, the general setting as introduced in the previous section would allow implementing the first
best solution with a mechanism of the Clarke-Groves type. Yet, transfer payments under efficient revelation mechanisms turn out to differ from correct
expectation damages significantly.
Therefore, in the following, rather provisions are examined that would
allow awarding correct expectation damages even under asymmetric information. More precisely, I shall investigate the class of mechanisms that are
reflecting expectation damages along the equilibrium path correctly. Similar to Shavell (1980) and Edlin and Reichelstein (1996), the initial contract
7
[q o , T o ] specifies party B’s constant performance choice q o ∈ Q, in consider-
ation of which party A must pay T o to B. Four cases will be distinguished
according to which party obtains private information and which party is
considering to breach the contract.
3.1
Case AB
In case AB it is party A who obtains private information but party B who
considers to breach. By deciding q 6= q o , party B is neglecting his obligation
and, in principle at least, owes expectation damages in the amount of
D(r, θ, q) = max[V (r, θ, qo ) − V (r, θ, q), 0]
(2)
to party A. If party A were awarded such damages then she would be at
least as well off as if B had met his obligation. More precisely, if V (r, θ, qo ) −
V (r, θ, q) ≥ 0 then she would be exactly as well off, well in line with ex-
pectation damages, whereas, if V (r, θ, q o ) − V (r, θ, q) < 0 she even enjoys
a windfall gain from B’s neglecting his obligation. Following common legal
practice, it is assumed that A may keep such windfall gains for free. Yet, as
θ remains private information of the buyer, courts may not be able to award
state-contingent damages D(r, θ, q) correctly.
To cope with hidden information, imagine that the informed party A is
required to communicate a message m out of a set of alternative messages M.
Party A must send her message after she has obtained private information
θ ∈ Θ but before performance choice q ∈ Q is due. The message is known to
affect the net payment, which A owes to B and which may further depend on
party A’s actual reliance investments as well as on B’s performance decision.
This transfer schedule is denoted by T (r, m, q) if reliance investments can be
verified in front of courts and by T (m, q) if investments are hidden action.
Such a transfer schedule provides incentives that can be calculated by
backwards induction. At the performance stage, where actual reliance investments and the message are known, party B will choose his performance
decision according to
qB (r, m) ∈ arg max T (r, m, q) − C(q).
q∈Q
Anticipating B’s performance choice and having obtained private information
8
θ, party A sends message
mA (r, θ) ∈ arg max V (r, θ, qB (r, m)) − T (r, m, qB (r, m)).
m∈M
Therefore, along the equilibrium path, performance choice as a function of
reliance investments and private information
η(r, θ) = qB (r, mA (r, θ))
will result and the net transfer will amount to
τ (r, θ) = T (r, mA (r, θ), η(r, θ))
such that the informed party A’s net payoff will be
I(r, θ) = V (r, θ, η(r, θ)) − τ (r, θ) − r.
This state-contingent payoff (and the underlying transfer schedule) is said to
reflect expectation damages correctly if
I(r, θ) = max [V (r, θ, q o ), V (r, θ, η(r, θ))] − T o − r
holds for all information parameters θ. In fact, buyer A would then be
awarded correct expectation damages, at least along the equilibrium path.
Reflecting correct expectation damages comes at a cost, as the following
proposition shows. While it may still be feasible to provide efficient reliance
incentives, in the light of Lema 1, the solution will typically fail to be ex post
efficient.
Proposition 1 Suppose assumptions (a) and (c) are met. If the transfer
schedule T (r, m, q) is reflecting correct expectation damages along the equilibrium path then party B will meet his obligation, i.e. η(r, θ) ≡ q o even if
it were efficient to breach. Moreover, party A has the incentive for reliance
investments
rA ∈ arg max E[V (r, θ, q o )] − r,
r∈R
which are efficient under a contract stipulating qo = q oo (if q oo exists).
Recall from the previous section that, under suitable differentiability, q oo
will exist if performance choice is of continuous type. If, however, performance choice is binary then underinvestment and overinvestment would result from a contract specifying qo = qL and qo = qH , respectively, as follows
from Lemma 2.
9
The proof of the above proposition combines the incentive constraints
that result from rational play with A’s net payoff if correct legal damages
were awarded. Details are provided in the appendix.
The next proposition shows a transfer schedule T ∗ (m, q) to exist that
leads to the first best solution even if reliance investments are hidden action. However, as follows from Proposition 1, the efficient transfer schedule
T ∗ (m, q) cannot reflect expectation damages correctly.
Proposition 2 A message space M and a transfer schedule T ∗ (m, q) exists
that lead, in equilibrium, to the first best solution.
The proof of Proposition 2 will be given at the end of the next subsection.
The efficient price schedule will be based on the direct, incentive-compatible
mechanism that follows from the analysis of case AA as a by-product.
To conclude this subsection, let me briefly compare the present findings
that were derived under asymmetric information with those that would hold
if the information parameter could be verified and, hence, correct damages
(2) could be administered by courts. Suppose, assumptions (b) and (c) are
met. If the contract specifies high performance qo = qH then party B has
the incentive to take the socially best response as his performance choice.
Ex post efficiency would be ensured. Yet, party A’s net payoff would then
amount to V (r, θ, qH ) − T o − r such that A is facing excessive incentives for
reliance investments as follows from Lemma 2 and (1).
If, at the other extreme, the contract specifies low performance q o = qL
then party B would stick to the contract. If such an outcome is anticipated
under complete information, the parties would be able to renegotiate to a
performance choice that is ex post efficient. Since party A would obtain only
a fraction of, say, 50 percent of the renegotiation surplus, A’s incentives for
reliance investments would be suboptimal.
In Shavell’s setting of binary performance choice, the high performance
contract is the only one available (the low performance contract would be
equivalent to no contract) and would provide excessive incentives for reliance investments indeed. In the Edlin and Reichelstein setting of continuous
performance choice, however, there exist intermediate levels of performance
choice that would provide efficient reliance incentives. In this sense, Shavell’s overreliance result is due to binary performance choice and not to a
10
basic defect of expectation damages.2
3.2
Case AA
In case AA, it is party A who obtains private information and who considers
to breach. Since party A is thought of as a buyer, breach would probably
be of the anticipatory type. After having obtained her private information,
party A may announce that she is only going to accept delivery q 6= q o . Since,
at the time of announcement, B has not yet started production, to mitigate
damages, B should deliver q but claim damages to compensate for profits lost
from A’s announcement. In any case, B must grant a reduction of payments
in the amount of B’s cost savings3 C(q o ) − C(q) such that B’s final payoff
amounts to
T o − [C(q o ) − C(q)] − C(q) = T o − C(q o ).
Party B is as well off as in the absence of anticipatory breach. Notice, in
case AA where B does not obtain private information, this price reduction
can easily be administered by courts.
If party A announces anticipatory breach q 6= q o , her net payoff amounts
to
Φ(r, θ, q) = V (r, θ, q) − T o + [C(qo ) − C(q)] − r = W (r, θ, q) + C(q o ) − T o
and is, up to terms independent of actual performance, equal to social surplus. Hence, party A’s performance choice in equilibrium solves
qA (r, θ) ∈ arg max Φ(r, θ, q) = arg max W (r, θ, q)
q∈Q
q∈Q
and coincides with the socially best response. Anticipating such choice at
the investment stage, A would have the incentive for efficient reliance investments, as
h
i
h
i
r∗ ∈ arg max E Φ(r, θ, q + (r, θ)) = arg max E W (r, θ, q + (r, θ))
r∈R
2
r∈R
For details, the reader is referred to Edlin and Reichelstein (1996) and, even closer in
line with the present setting, to Schweizer (2005).
3
Notice, for ease of exposition, windfall gains arising from deviations are ruled out in
the treatment of case AA.
11
would hold. In case AA, the first best solution can be implemented by
just requiring the producer to mitigate damages resulting from anticipatory
breach.
Such practice gives rise to a direct and efficient mechanism, which is
incentive compatible and which works even if reliance investments are hidden
action. Under this mechanism, the informed party A is directly asked to
reveal his private information. Imagine that the true information is θ but A
reports θ0 ∈ Θ which may be false. The direct mechanism then imposes the
performance choice η(θ0 ) = q ∗ (θ0 ) that would be the socially best response
if A had invested efficiently and reported truthfully. Moreover, party A is
required to pay τ (θ0 ) = C(q ∗ (θ0 )) to party B. This direct mechanism is of the
Clarke-Groves type. It provides the following incentives.
Suppose party A makes reliance investments r and plans to reveal information θ0 = t(r, θ) if she later obtains private information θ. At the
investment stage, her expected payoff under the direct mechanism amounts
to
E[V (r, θ, q∗ (θ0 )) − C(q ∗ (θ0 ))] − r ≤ E[V (r∗ , θ, q ∗ (θ)) − C(q ∗ (θ))] − r∗
and cannot be higher than if A had invested efficiently and revealed truthfully.
In this sense, the above direct mechanism is incentive compatible, assigns
the social surplus to A and, as a consequence, provides efficient investment
incentives to A. To gain the consent of B, A would have to make an up-front
payment that, however, would not affect incentives. In fact, with up-front
payment T o − C(qo ), the direct mechanism would lead to exactly the same
solution as if the producer must grant a price reduction for anticipatory
breach in the amount of cost savings.
This direct mechanism may also serve as a basis for the efficient transfer
schedule T ∗ (m, q), whose existence is claimed by Proposition 2. In fact, take
as message space M = Θ. If A has announced m = θ0 ∈ M = Θ and B takes
performance choice q ∈ Q then the payment schedule
2
T ∗ (θ0 , q) = T o + C(q) − [V (r∗ , θ0 , q) − V (r∗ , θ0 , q∗ (θ0 ))]
provides efficient incentives. Indeed, since B is compensated for actual production costs, he has the incentive to minimize the square term by deciding
q = q∗ (θ0 ) at the performance stage. Party A’s net payoff then amounts to
V (r, θ, q∗ (θ0 )) − T ∗ (θ0 , q) − r = V (r, θ, q ∗ (θ0 )) − T o − C(q ∗ (θ0 )) − r
12
and, obviously, provides incentives to report truthfully and to invest efficiently. The only difference with the direct mechanism arises from the fact
that, under the efficient transfer schedule, the breach decision is inalienably
assigned to party B whereas, under the direct mechanism, it is exogenously
imposed by the operator of the mechanism. In equilibrium, however, the
efficient price schedule and the direct mechanism are leading to the same
outcome.4 Proposition 2 is established.
3.3
Case BA
In case BA it is party B who obtains private information but it is party A
who considers to breach. Again, breach is assumed to be of the anticipatory
type. If A announces in time to accept delivery q 6= q o only, in principle,
B must grant a reduction of payments in the amount of his cost savings
C(θ, q o )−C(θ, q). Due to hidden information, however, courts may no longer
be able to administer such a price reduction correctly.
As in case BA, to cope with hidden information, imagine that the informed party B is required to communicate a message m out of a set of
alternative messages M. Party B must send his message after he has obtained private information θ ∈ Θ but before the performance decision q ∈ Q
is due. The message is known to affect the net payment, which A owes to
B and which may also depend on A’s performance decision. The transfer
schedule is denoted by T (r, m, q) if reliance investments can be verified in
front of courts and by T (m, q) if investments are hidden action.
Case BA can now be handled along the same line as case AB. It turns out
again that transfer schedules reflecting the price reduction correctly will lead
party A to meeting her obligation even if breach were efficient. Moreover,
under continuous performance choice, it may again be feasible to provide
efficient incentives for reliance investments. Nonetheless, due to ex post inefficiencies, the first best will typically not be reached if the transfer schedule
reflects the price reduction correctly.
By the appropriate revelation mechanism, however, the first best solution
could easily be implemented as follows from adapting Proposition 2 to case
BA. Details are left to the reader.
4
For the general version of the taxation principle that is at stake, see Guesnerie (1995).
13
3.4
Case BB
In case BB, it is party B who obtains private information and who considers
to breach. If B delivers q 6= qo , then B owes damages
D(r, q) = max [V (r, q o ) − V (r, q), 0]
to A. Since A does not obtain private information, such damages can be
verified in front of courts provided that reliance investments are observable.
B’s net payoff then amounts to
Ψ(r, θ, q) = T o − C(θ, q) − max [V (r, q o ) − V (r, q), 0]
and, hence, B takes performance decision
qB (r, θ) ∈ arg max Ψ(r, θ, q).
q∈Q
If the contract specifies a delivery choice q o such that, under the socially best
response, windfall gains will never arise then B’s net payoff
Ψ(r, θ, q) = T o + V (r, q) − C(θ, q) − V (r, q o )
would coincide, up to terms that do not depend on performance choice, with
social surplus. As a consequence, party B would have the incentive to choose
the socially best response.
In contrast to case AA, however, performance decisions q o that avoid
windfall gains may be at odds with efficient reliance incentives. In fact, A’s
payoff under the above scheme amounts to
V (r, qo ) − T o − r
such that reliance incentives may be excessive if the contract specifies a performance choice that avoids windfall gains. Notice, a similar conflict between
ex post efficiency and efficient reliance incentives did not arise in case AA
where it was the investing party A who obtained private information and
considered to breach.
4
Legal practice facing hidden information
Legal practice facing problems of asymmetric information either takes resort
to objectifying damage measures or allows to opt for reliance damages. The
14
present section examines such practice. The issue of verifiability arises in the
two cases AB and BA where the uninformed party considers to breach such
that expectation damages must be based on the informed party’s profit or
utility function. This function depends on the private information of that
party and, hence, cannot be verified in front of courts.
In the setting of case AB, objectifying expectation damages would mean
to fictitiously postulate an objective type θo ∈ Θ, based on which expectation
damages amounting to
Do (r, q) = max [V (r, θo , qo ) − V (r, θo , q), 0]
would be awarded to party A. Of course, A’s private information may actually
differ from the objective type.
Objectified expectation damages are leading to an effective transfer schedule
T (r, q) = T o − Do (r, q)
that does not depend on any message from the informed party. Such schedules must necessarily lead to an outcome that fails to be state-contingent. In
fact, party B would choose performance decision
qB (r) ∈ arg max T (r, q) − C(q),
q∈Q
independent of the actual state θ. Anticipating B’s performance choice, party
A makes reliance investments
rA ∈ arg max E [V (r, θ, qB (r))] − T (r, qB (r) − r.
r∈R
While it may still be feasible to generate efficient reliance incentives, the
solution typically fails to be ex post efficient because performance choice is
constant, no matter which move of nature has materialized.
Some legal systems including the German5 one allow the promisee to
opt for recovery of reliance expenditures instead of expectation damages.
Allegedly, the option was introduced to accommodate promisees that have
difficulties to verify their true expectation damages in front of courts. Yet,
since reliance damages are also leading to an effective transfer schedule T (r, q)
that does not depend on nature’s move, ex post efficiency would neither be
restored.
5
See § 284 BGB (German Civil Code).
15
To sum up, practical solutions of awarding damages under asymmetric
information seem defective on two accounts. First, they fail to assess expectation damages correctly. If granted such damages, the promisee need not
be equally well off as if the promisor had met his obligation. Second, the
outcome will be constant over states and, as such, will typically fail to be ex
post efficient.
5
Conclusion
For a reliance setting with hidden information, the present paper has established that a trade-off exists between providing efficient incentives and assessing expectation damages correctly. Provisions that would allow to assess
expectation damages correctly prevent efficient breach of contract whereas
revelation mechanisms leading to the first best solution would fail to assess
damages correctly.
Legal practice seems to be relying on two remedies. First, damages may
be awarded that are of an objective type. This approach is shown to be
defective as it neither assesses expectation damages correctly nor does it provide incentives for efficient breach. Second, the party suffering from breach
and failing to verify her expectation damages in front of courts may opt
for recovery of reliance damages instead. The outcome, again, cannot be
state-contingent and, hence, ex post efficiency will not be achieved.
Since revelation mechanisms were available that would generate the first
best solution, at least for the present setting, justifying such legal practice
from the economic perspective remains a challenging task for future research.
6
References
Edlin, A. and S. Reichelstein (1996), ”Holdups, standard breach remedies,
and optimal investments,” American Economic Review 86, 478 — 501.
Guesnerie, R. (1995): A Contribution to the Pure Theory of Taxation.
Cambridge University Press, Cambridge.
Myerson, R.B. and M.A. Satterthwaite (1981), ”Efficient mechanisms for
bilateral trade,” Journal of Economic Theory 6, 58 — 73.
16
Schweizer. U. (2005), ”Law and economics of obligations,” International
Review of Law and Economics 25, 209 — 228.
Shavell, S. (1980), ”Damage Measures for Breach of Contract”, Bell Journal
of Economics 11, 466 — 490.
Shavell, S. (2004). Foundations of Economic Analysis of Law. The Belknap
Press of Harvard University Press: Cambridge, Massachusetts.
7
Appendix
In this appendix, the proof of Proposition 1 is presented. The proposition
deals with case AB where it is party A who obtains private information
but party B who has the option to breach. Suppose the transfer schedule
T (r, m, q) gives rise, in equilibrium, to the performance choice η(r, θ) and the
transfer payment τ (r, θ) as explained in the subsection on the case AB. The
informed party’s equilibrium payoff then amounts to
I(r, θ) = V (r, θ, η(r, θ)) − τ (r, θ) − r.
The following lemma is well-known from mechanism design: The incentive
constraints are met and equilibrium performance is a monotonically increasing function of private information.
Lemma 3 Suppose assumption (a) is met. Then, for all θ, θ0 ∈ Θ, it holds
that
V (r, θ0 , η(r, θ)) − V (r, θ, η(r, θ)) ≤ I(r, θ0 ) − I(r, θ) ≤
≤ V (r, θ0 , η(r, θ0 )) − V (r, θ, η(r, θ0 )).
Moreover, if θ < θ0 then η(r, θ) ≤ η(r, θ0 ).
Proof. Since the message sent maximizes the informed party A’s payoff it
follows that
I(r, θ) = V (r, θ, qB (r, mA (r, θ)) − T (r, mA (r, θ), qB (r, mA (r, θ))) − r
= V (r, θ, η(r, θ)) − τ (r, θ) − r
≥ V (r, θ, qB (r, m)) − T (r, mA (r, θ, qB (r, m))) − r
17
must hold for any other message m ∈ M. In particular, this must be true
for the message m = mA (r, θ0 ) that A would have sent in equilibrium after
having obtained private information θ0 . It follows that
I(r, θ) ≥ V (r, θ, qB (r, mA (r, θ0 )) − T (r, mA (r, θ0 ), qB (r, mA (r, θ0 ))) − r =
V (r, θ, η(r, θ0 )) − τ (r, θ0 ) − r,
from which the second inequality of the lemma follows easily.
The first inequality follows from a similar argument for the situation
where the true information is θ0 but the informed party has revealed θ instead.
Moreover, the monotonicity of performance choice as a function of private
information follows from the single-crossing property (assumption (a)) and
the two inequalities that have just been established.
Proof of Proposition 1. Let
θo = sup{θ ∈ Θ : η(r, θ) ≤ qo }
denote the supremum of all moves of nature, under which the performance
choice does not exceed the quantity specified in the contract. It then follows
from the monotonicity established in Lemma 3 that, for θ < θo , η(r, θ) ≤ q o .
Moreover, if θ0 < θ00 < θo , then
V (r, θ00 , η(r, θ0 )) − V (r, θ0 , η(r, θ0 )) ≤ V (r, θ00 , q o ) − V (r, θ0 , q o )
≤ V (r, θ00 , η(r, θ00 )) − V (r, θ0 , η(r, θ00 ))
because, in this range of information parameters, A’s payoff is the same as if
B had met his obligation. It then follows from the single crossing property
that η(r, θ0 ) ≤ qo ≤ η(r, θ00 ) must hold for any two information parameters
θ0 < θ00 < θo .
For any θ < θo , consider two information parameters θ0 < θ < θ00 <
θo from this range and apply the above findings pairwise. In particular,
η(r, θ0 ) ≤ q o ≤ η(r, θ) and η(r, θ) ≤ qo ≤ η(r, θ00 ) must both hold, from which
it follows that η(r, θ) = qo must be constant over the range (θL , θo ).
Next, consider information parameters from the range θo < θ < θH . For
such parameters, q o < η(r, θ) must hold as follows from the monotonicity of
the equilibrium performance choice. Moreover, in this range, the net payoff
of party A amounts to
I(r, θ) = V (r, θ, η(r, θ)) − r − T o ,
18
which, combined with the incentive constraints from Lemma 3, is leading to
V (r, θ00 , η(r, θ0 )) − V (r, θ0 , η(r, θ0 )) ≤ V (r, θ00 , η(r, θ00 )) − V (r, θ0 , η(r, θ0 ))
≤ V (r, θ00 , η(r, θ00 )) − V (r, θ0 , η(r, θ00 ))
for any two information parameters in the range θo < θ0 < θ00 < θH and,
hence, to
V (r, θ00 , η(r, θ0 )) ≤ V (r, θ00 , η(r, θ00 ))
and
V (r, θ0 , η(r, θ00 )) ≤ V (r, θ0 , η(r, θ0 )).
It then follows from the monotonicity of utility as a function of performance
choice (assumption (c)), that equilibrium performance choice
η(r, θ0 ) = η(r, θ00 ) = q 0
will be constant in this range as well.
Consider, finally, an information parameter θ < θo < θ0 from each range.
It then follows from the monotonicity of performance choice that
η(r, θ) = q o ≤ η(r, θ0 ) = q0
and from the incentive constraints that
I(r, θ0 ) − I(r, θ) = V (r, θ0 , q0 ) − V (r, θ, q o ) ≤
V (r, θ0 , η(r, θ0 )) − V (r, θ, η(r, θ0 )) = V (r, θ0 , q0 ) − V (r, θ, q 0 )
and, hence, that V (r, θ, q 0 ) ≤ V (r, θ, q o ) must hold. By making use of the
monotonicity of utility as a function of performance choice, it follows that
qo = q 0 must hold. Proposition 1 is established.
19